BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Institute of Operational Privacy Design - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Institute of Operational Privacy Design
X-ORIGINAL-URL:https://instituteofprivacydesign.org
X-WR-CALDESC:Events for Institute of Operational Privacy Design
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Halifax
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20230312T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20231105T050000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20240310T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20241103T050000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0400
TZOFFSETTO:-0300
TZNAME:ADT
DTSTART:20250309T060000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0300
TZOFFSETTO:-0400
TZNAME:AST
DTSTART:20251102T050000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Halifax:20240425T120000
DTEND;TZID=America/Halifax:20240425T130000
DTSTAMP:20260503T120650
CREATED:20240103T231906Z
LAST-MODIFIED:20240416T180307Z
UID:5410-1714046400-1714050000@instituteofprivacydesign.org
SUMMARY:From Permission Usage to Compliance Analysis | Privacy Engineering & Technology Education Discussion (PETed)
DESCRIPTION:Join our IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a recorded 10-minute introduction followed by a 40-minute informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data\, zero-knowledge proofs\, homomorphic encryption\, and translucent databases. \nThe participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion\, new speaker\, and new insights on the most cutting-edge privacy challenges! \n  \nDate & Time:\nApril 25\, 2024 @ 12:00 PM EDT / 5:00 PM CET \n  \nTopic:\nFrom Permission Usage to Compliance Analysis: Lessons Learned Analyzing Android Apps for 10 years \n  \nSynopsis:\nWe have been analyzing Android apps for regulatory requirements for eight years. We have analyzed Android apps for COPPA\, CCPA\, and Health Compliance (HIPAA\, HBNR\, and FTC Act). In this talk\, I present the lessons learned after analyzing thousands of apps\, the technical challenges we face while analyzing Android apps\, patterns of non-compliance issues we uncovered\, and the likely root causes of non-compliance. The talk will touch upon challenges posed by third-party code in complying with regulatory requirements\, the importance of privacy assessment\, and how the technical realm has changed over time for privacy assessments. \n  \nProblem Statement:\nWhat are the risks posed by the use of third-party code in the mobile ecosystem? How can you identify those risks before they become a regulatory headache? \n  \nRelated PETs (Privacy-Enhancing Technologies):\n\nAccountability\nCode Transparency\nPermission Usage\nPrivacy Assessment\nDynamic Analysis\n\n  \nPre-Discussion Resources:\n\nhttps://petsymposium.org/popets/2018/popets-2018-0021.php \nhttps://www.usenix.org/system/files/sec19-reardon.pdf \nhttps://petsymposium.org/popets/2023/popets-2023-0072.php \nhttps://conpro23.ieee-security.org/papers/samarin-conpro23.pdf \nhttps://www.ieee-security.org/TC/SPW2021/ConPro/papers/samarin-conpro21.pdf \nhttps://www.ieee-security.org/TC/SPW2019/ConPro/papers/okoyomon-conpro19.pdf \nhttps://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-wijesekera.pdf \nhttps://petsymposium.org/popets/2022/popets-2022-0108.pdf \nhttps://petsymposium.org/popets/2020/popets-2020-0050.pdf \nhttps://www.issa.org/event/taking-responsibility-for-someone-elses-code-studying-the-privacy-behaviors-of-mobile-apps-at-scale/ \n\n  \nSpeaker:\nPrimal Wijesekera\nPrimal Wijesekera is a research scientist in the Usable Security and Privacy Research Group at ICSI and holds an EECS appointment at the University of California\, Berkeley. His research exposes current privacy and security vulnerabilities and provides systematic solutions to meet consumers’ privacy expectations. He has extensive experience in mobile app analysis for privacy and security violations and implementing privacy protections for Android. He has published in top-tier security venues (IEEE S&P\, USENIX Security) and usable security and privacy venues (ACM CHI\, SOUPS\, PETS). He received his Ph.D. from the University of British Columbia\, although he carried out his Ph.D. research at UC Berkeley. His research on privacy on mobile platforms has received the Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies\, the USENIX Security Distinguished Paper Award\, the AEPD Emilio Aced Personal Data Protection Research Award\, and the CNIL-INRIA Privacy Award. He is a PI/Co-PI on multiple NSF Projects. He has also helped federal regulators in sensitive privacy investigations. He has also held an engineering position at Microsoft. \n  \nModerator:\nKimberly Lancaster \nTrusted Privacy Advisor who Guides Data Protection\, Drives Operational Excellence\, and Leads with Integrity by aligning with InfoSec\, Security\, GRC\, Compliance\, and Data Governance. Board Member\, Speaker\, and Author. \n  \nThe IOPD Privacy Engineering & Technology Education Discussion (PETed) Series is a members-only event. Join as an Ambassador before the 1st of each month to get invited to this month’s event! Please reach out to a current member to be invited as a guest. If you are already a member\, subscribe to our PETed Mailing List for announcements and monthly invitations!
URL:https://instituteofprivacydesign.org/event/march-2024-privacy-engineering-technology-education-discussion-peted/
LOCATION:https://iopd.whereby.com/peted-discussion
CATEGORIES:PETed
ATTACH;FMTTYPE=image/png:https://instituteofprivacydesign.org/wp-content/uploads/2024/01/4-1.png
END:VEVENT
END:VCALENDAR